Block-chain abnormal transaction detection method based on generative adversarial network and autoencoder

Ao Xiong , Chenbin Qiao , Wenjing Li , Dong Wang , Da Li , Bo Gao , Weixian Wang

High-Confidence Computing ›› 2025, Vol. 5 ›› Issue (4) : 100313

PDF
High-Confidence Computing ›› 2025, Vol. 5 ›› Issue (4) :100313 DOI: 10.1016/j.hcc.2025.100313
Research Articles
research-article

Block-chain abnormal transaction detection method based on generative adversarial network and autoencoder

Author information +
History +
PDF

Abstract

Anomaly detection in blockchain transactions faces several challenges, the most prominent being the imbalance between positive and negative samples. Most transaction data are normal, with only a small fraction of anomalous data. Additionally, blockchain transaction datasets tend to be small and often incomplete, which complicates the process of anomaly detection. When using simple AI models, selecting the appropriate model and tuning parameters becomes difficult, resulting in poor performance. To address these issues, this paper proposes GANAnomaly, an anomaly detection model based on Generative Adversarial Networks (GANs) and Autoencoders. The model consists of three components: a data generation model, an encoding model, and a detection model. Firstly, the Wasserstein GAN (WGAN) is employed as the data generation model. The generated data is then used to train an encoding model that performs feature extraction and dimensionality reduction. Finally, the trained encoder serves as the feature extractor for the detection model. This approach leverages GANs to mitigate the challenges of low data volume and data imbalance, while the encoder extracts relevant features and reduces dimensionality. Experimental results demonstrate that the proposed anomaly detection model outperforms traditional methods by more accurately identifying anomalous blockchain transactions, reducing the false positive rate, and improving both accuracy and efficiency.

Keywords

Blockchain / Anomaly detection / Auto-encoder / Generative adversarial network

Cite this article

Download citation ▾
Ao Xiong, Chenbin Qiao, Wenjing Li, Dong Wang, Da Li, Bo Gao, Weixian Wang. Block-chain abnormal transaction detection method based on generative adversarial network and autoencoder. High-Confidence Computing, 2025, 5(4): 100313 DOI:10.1016/j.hcc.2025.100313

登录浏览全文

4963

注册一个新账户 忘记密码

CRediT authorship contribution statement

Ao Xiong: Data curation. Chenbin Qiao: Conceptualization. Wenjing Li: Formal analysis. Dong Wang: Funding acquisition. Da Li: Methodology. Bo Gao: Project administration. Weixian Wang: Resources.

Declaration of competing interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

References

[1]

Ouyang Shanshan, Application of blockchain technology in the exchange, Secur. Futur. China 01 (2024) 17-23.

[2]

Sun Guozi, Li Zhi, Xiao Rongyu, et al., Research on blockchain transaction security, J. Nanjing Univ. Posts Telecommun. (Nat. Sci. Ed). 41 (02) (2021) 36-48.

[3]

Zhao Zening, Research on Key Techniques for Identifying Abnormal Transaction Behaviors in Blockchain Doctor, Tianjin University of Technology, 2023.

[4]

Z. Li, F. Liu, W. Yang, et al., A survey of convolutional neural networks: Analysis, applications, and prospects, IEEE Trans. Neural Netw. Learn. Syst. 33 (12) (2022) 6999-7019.

[5]

Zhu Huijuan, Chen Jinfu, Li Zhiyuan, et al., Block-chain abnormal transaction detection method based on adaptive multi-feature fusion, J. Commun. 42 (05) (2021) 41-50.

[6]

Wang Xin, Zhang Tao, Jin Yinggu, Overview of anomaly detection algorithms, Mod. Comput. 30 (2020) 21-26.

[7]

D.S. Demetis, Fighting money laundering with technology: A case study of Bank X in the UK, Decis. Support Syst. 105 (2018) 96-107.

[8]

M. Jullum, A. Lland, R.B. Huseby, et al., Detecting money laundering transactions with machine learning, J. Money Laund. Control. 23 (2020) 173-186.

[9]

Y. Yang, Q.M.J. Wu, Y. Wang, Autoencoder with invertible functions for dimension reduction and image reconstruction, IEEE Trans. Syst. 48 (7) (2016) 1065-1079.

[10]

E.L. Paula, M. Laderia, R.N. Carvalho, et al., Deep learning anomaly detection as support fraud investigation in Brazilian exports and anti-money laundering, in: 2016 15th IEEE International Conference on Machine Learning and Applications, IEEE, Anaheim, 2016, pp. 954-960.

[11]

M. Weber, G. Domeniconi, J. Chen, et al., Anti-money laundering in bitcoin: experimenting with graph convolutional networks for financial forensics, 2019, arXiv, arXiv:1908.02591.

[12]

W. Wang, et al., BSIF: Blockchain-based secure, interactive, and fair mobile crowdsensing, IEEE J. Sel. Areas Commun. 40 (12) (2022) 3452-3469, http://dx.doi.org/10.1109/JSAC.2022.3213306.

[13]

W. Wang, et al., Blockchain and PUF-based lightweight authentication protocol for wireless medical sensor networks, IEEE Internet Things J. 9 (11) (2022) 8883-8891, http://dx.doi.org/10.1109/JIOT.2021.3117762.

[14]

W. Wang, H. Xu, M. Alazab, T.R. Gadekallu, Z. Han, C. Su, Blockchain-based reliable and efficient certificateless signature for IIoT devices, IEEE Trans. Ind. Inf. 18 (10) (2022) 7059-7067, http://dx.doi.org/10.1109/TII.2021.3084753.

[15]

M.A. Hearst, S.T. Dumais, E. Osuna, J. Platt, et al., Support vector machines, IEEE Intell. Syst. their Appl. 13 (4) (1998) 18-28.

[16]

Z. Li, F. Liu, W. Yang, et al., A survey of convolutional neural networks: Analysis, Appl. Prospect. IEEE Trans. Neural Networks Learn. Syst. 33 (12) (2022) 6999-7019.

[17]

R. Trivedi, H. Dai, Y. Wang, et al., Know-evolve: deep temporal reasoning for dynamic knowledge graphs,in:the 34th International Conference on Machine Learning, Association for Computing Machinery, 2017, pp. 3462-3471.

[18]

S. Hochreiter, J. Schmidhuber, Long short-term memory, Neural Comput. 9 (8) (1997) 1735-1780.

PDF

134

Accesses

0

Citation

Detail

Sections
Recommended

/